Analysis
-
max time kernel
145s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 23:22
Static task
static1
Behavioral task
behavioral1
Sample
68fc37b0ffeb8e3dec2794c580492f52_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
68fc37b0ffeb8e3dec2794c580492f52_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
68fc37b0ffeb8e3dec2794c580492f52_JaffaCakes118.html
-
Size
16KB
-
MD5
68fc37b0ffeb8e3dec2794c580492f52
-
SHA1
09df8d1870208f6e847ac9d6265ed65c9e9861a7
-
SHA256
1019366da8fca22caf14a93ac68ed3adcd58be962deba64c74b0bd20aa68bcc0
-
SHA512
461af4fba05703a6579cc3ab6d4954d8af0682f6ec8d7d570928174f2157fbcd98d1fb83cdab8fdc7f7fea602d4dc8e51e5954c5c8964f2c32e90df13873fd65
-
SSDEEP
384:dEX6Bl2ihokt9Szold/jIBiDRWPBMUpdwV2/pN1FekQesRRJvnc/oWRB5:Uuz6kt9SElVjIVC2//pN1FdQaoWRB5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 2612 msedge.exe 2612 msedge.exe 4512 msedge.exe 4512 msedge.exe 4012 identity_helper.exe 4012 identity_helper.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4512 wrote to memory of 3064 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 3064 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 3612 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 3612 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 3612 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 3612 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 3612 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 3612 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 3612 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 3612 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 3612 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 3612 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 3612 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 3612 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 3612 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 3612 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 3612 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 3612 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 3612 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 3612 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 3612 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 3612 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 3612 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 3612 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 3612 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 3612 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 3612 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 3612 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 3612 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 3612 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 3612 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 3612 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 3612 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 3612 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 3612 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 3612 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 3612 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 3612 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 3612 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 3612 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 3612 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 3612 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 2612 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 2612 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 628 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 628 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 628 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 628 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 628 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 628 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 628 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 628 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 628 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 628 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 628 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 628 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 628 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 628 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 628 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 628 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 628 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 628 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 628 4512 msedge.exe msedge.exe PID 4512 wrote to memory of 628 4512 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\68fc37b0ffeb8e3dec2794c580492f52_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe413d46f8,0x7ffe413d4708,0x7ffe413d47182⤵PID:3064
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,521134468677223558,16862385983523110624,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:3612
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,521134468677223558,16862385983523110624,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2612 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,521134468677223558,16862385983523110624,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2364 /prefetch:82⤵PID:628
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,521134468677223558,16862385983523110624,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:736
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,521134468677223558,16862385983523110624,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:2036
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,521134468677223558,16862385983523110624,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6044 /prefetch:82⤵PID:1996
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,521134468677223558,16862385983523110624,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6044 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4012 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,521134468677223558,16862385983523110624,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:5112
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,521134468677223558,16862385983523110624,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:4860
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,521134468677223558,16862385983523110624,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:4840
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,521134468677223558,16862385983523110624,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:1348
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,521134468677223558,16862385983523110624,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4840 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3872
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:808
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
5KB
MD5e56a015ff1b857abb07892b4d5a7b6ac
SHA17642830975ce8a1648e174dd869e4e5899c04f97
SHA2568a53ab4ce5d4b5a95615bffa6c2dfdd495e636297217d6e4933b1ad6861bfc47
SHA512dd10c6943ca7dffe1c3e6d6efca24f209e257d566fc889ed4136d5d9b777f3435c4e223f232ba0499282f6a3f8c26b75449a7410f17ca337c95dd76a6a0abc42
-
Filesize
6KB
MD504bf5d79d0971836f01511c35520ad1e
SHA1f86bd03f4b6afeb0e135a6f326a0d76d9bd821a8
SHA25623324234e7e6edef8e91abd2173fdfecf0bca819a646910c53cf2867770deb84
SHA51225b2803c3bc20019762f7ffa41aadd99307c65fc08ac348d3260c92fe87851b4e02eb5f5272c9bb70622691a1dab15ab2e6eb0569350abada4c9c9fe7c96cc3d
-
Filesize
6KB
MD56fa1ff842db466c35718bc0bc82e607f
SHA1553eecf32d178d7ee09056d8cd48a08feb69d375
SHA25662bc57e7f99a12da2cd03da3608f5c9760c73a7fb0e04978dbbdcfe7ae5d2907
SHA51213a1c3d269c98cd326012ce353fe9a9d3a467d3e4287aabe6f77601b8b4f95002eeacd27d1ef156b1c36aff3e86b560159ac4db4ad9679219b1aa74a2e0bc6e8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD53da5e68d3a6b959c42170bcf9a350faf
SHA1ecc940d31b2cbf3e594316c18b0f49f7fe6f3c06
SHA2563bccd056f8c421c5bfa27b2aba483342308ada948d97bbc46cfcdfecac7c1334
SHA512e9f2d43eb3217e0eda9d0c5cd500e893c6f41f85b7341e1a3875d59aa768cffbd4244fb84b37ce61b9890b74737238ea73a176952c09617919ce336aa9aa4bd0
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e